Please enable JavaScript to use CodeHS

Standards Mapping

for Ohio 9-12 Foundational

34

Standards in this Framework

19

Standards Mapped

55%

Mapped to Course

Standard Lessons
CS.D.9-12.F.a
Identify different multifunctional computing devices and connection technologies, both virtual and physical, to describe their purpose.
CS.D.9-12.F.b
Develop and apply criteria to evaluate computing systems for a given purpose.
CS.D.9-12.F.c
Create an artifact to demonstrate the roles and interactions of computing systems embedded in everyday objects.
CS.HS.9-12.F.a
Compare and contrast interactions between application software, system software and hardware.
  1. 7.1 Operating Systems
  2. 7.4 Software and Applications
  3. 11.1 Internal Components
  4. 11.2 Peripheral Devices
CS.T.9-12.F.a
Apply a systemic process to identify problems and take steps to correct them within an integrated computing system.
  1. 12.1 Methodology
  2. 12.2 Support Practice
CS.T.9-12.F.b
Analyze an IT device to determine either what repairs are needed or how to build it.
NI.N.9-12.F.a
Evaluate and select networking devices to establish scalable communications.
  1. 10.4 Internet Hardware and Sending Information
  2. 11.3 Network Devices
  3. 11.5 Network Options
NI.N.9-12.F.b
Evaluate and select networking protocols to establish network communication.
  1. 10.8 Packets & Protocols
  2. 11.6 Network Communication
NI.N.9-12.F.c
Understand scalability and reliability of networks to describe the relationships and effects of how the different types of networks work together.
  1. 10.4 Internet Hardware and Sending Information
  2. 10.8 Packets & Protocols
  3. 11.3 Network Devices
  4. 11.5 Network Options
NI.C.9-12.F.a
Examine and employ principles of cybersecurity.
  1. 1.4 The CIA Triad
  2. 2.4 Privacy & Security
  3. 2.7 Hacking Ethics
  4. 7.6 Application Security
  5. 7.7 Browser Configuration
  6. 7.8 System Administration
  7. 11.6 Network Communication
  8. 11.7 Network Management
NI.C.9-12.F.b
Identify physical, social and digital security risks to address possible attacks.
  1. 1.3 Impact of Cybersecurity
  2. 2.4 Privacy & Security
  3. 7.6 Application Security
  4. 7.7 Browser Configuration
  5. 7.8 System Administration
  6. 8.9 Common Security Problems
  7. 8.10 SQL Injection Overview
  8. 8.11 Types of SQLi and Prevention
  9. 11.6 Network Communication
  10. 11.7 Network Management
DA.DCS.9-12.F.a
Analyze patterns in a real-world data store through hypothesis, testing and use of data tools to gain insight and knowledge.
DA.DCS.9-12.F.b
Investigate data storage systems to compare and contrast how data is stored and accessed.
  1. 8.4 Databases
  2. 8.5 Clients and Servers
  3. 11.4 Storage Options
DA.VC.9-12.F.a
Analyze the benefits and limitations of data visualization or multisensory artifacts and tools to communicate which is most appropriate to solve a real-world problem.
DA.IM.9-12.F.a
Evaluate a model by creating a hypothesis, testing it and refining it to discover connections and trends in the data.
ATP.A.9-12.F.a
Define and use appropriate problem solving strategies and visual artifacts to create and refine a solution to a realworld problem.
ATP.A.9-12.F.b
Define and implement an algorithm by decomposing problem requirements from a problem statement to solve a problem.
  1. 21.1 Challenge Problems
  2. 23.1 Control Structures Challenges
ATP.VDR.9-12.F.a
Identify types of variables and data and utilize them to create a computer program that stores data in appropriate ways.
ATP.CS.9-12.F.a
Define control structures and Boolean logic and use them to solve real-world scenarios.
  1. 4.3 Looping
  2. 4.4 Branching
  3. 22.1 Booleans
  4. 22.2 Logical Operators
  5. 22.3 Comparison Operators
  6. 22.4 If Statements
  7. 22.5 For Loops in JavaScript
  8. 22.6 General For Loops
  9. 22.7 For Loop Practice
  10. 22.9 While Loops
  11. 22.10 Loop and a Half
  12. 23.1 Control Structures Challenges
ATP.CS.9-12.F.b
Use appropriate syntax to create and use a method.
ATP.CS.9-12.F.c
Use data scoping to isolate data.
ATP.M.9-12.F.a
Break down a solution into procedures using systematic analysis and design.
ATP.M.9-12.F.b
Create computational artifacts by systematically organizing, manipulating and/or processing data
ATP.PD.9-12.F.a
Investigate software development methodologies to select the appropriate one for a project to complete as a team.
ATP.PD.9-12.F.b
Compare test methodologies to evaluate why each is used and to determine their benefits and costs.
ATP.PD.9-12.F.c
Correctly use consistent naming conventions, version control and comments to demonstrate why these are important for future use, maintenance and reuse of code.
  1. 4.6 Organizational Techniques
IC.Cu.9-12.F.a
Analyze new technology to predict realistic impacts on society.
  1. 10.11 Impact of the Internet
IC.Cu.9-12.F.b
Explore other professions to understand how computing has and will impact them positively and negatively.
  1. 10.11 Impact of the Internet
IC.SI.9-12.F.a
Evaluate tools to increase connectivity of people in different cultures and career fields.
  1. 7.4 Software and Applications
IC.SI.9-12.F.b
Analyze the collection and generation of data through automated processes to explain the privacy concerns that are not always evident to users.
  1. 7.5 Software Licenses
  2. 7.7 Browser Configuration
  3. 8.10 SQL Injection Overview
  4. 8.11 Types of SQLi and Prevention
IC.SLE.9-12.F.a
Interpret and analyze breaches in privacy and security to investigate the legal and ethical impact.
  1. 1.2 What is Cybersecurity?
  2. 1.3 Impact of Cybersecurity
  3. 2.4 Privacy & Security
  4. 2.7 Hacking Ethics
IC.SLE.9-12.F.b
Analyze the concepts of usability and security to explain typical tradeoffs between them.
  1. 7.7 Browser Configuration
  2. 8.9 Common Security Problems
IC.SLE.9-12.F.c
Analyze the collection and generation of data through automated processes to explain the legal concerns that are not always evident to users.
  1. 7.5 Software Licenses
  2. 7.7 Browser Configuration
  3. 8.10 SQL Injection Overview
  4. 8.11 Types of SQLi and Prevention
IC.SLE.9-12.F.d
Explain the beneficial and harmful effects of intellectual property laws to determine the impacts on innovation.
  1. 2.6 Creative Credit & Copyright
  2. 10.10 Creative Credit & Copyright